So far after every big update my manjaro gets this error

After the big manjaro updates laptop doesnt start.

/etc/crypttab

# /etc/crypttab: mappings for encrypted partitions.
#
# Each mapped device will be created in /dev/mapper, so your /etc/fstab
# should use the /dev/mapper/<name> paths for encrypted devices.
#
# See crypttab(5) for the supported syntax.
#
# NOTE: Do not list your root (/) partition here, it must be set up
#       beforehand by the initramfs (/etc/mkinitcpio.conf). The same applies
#       to encrypted swap, which should be set up with mkinitcpio-openswap
#       for resume support.
#
# <name>               <device>                         <password> <options>
#luks-5ef2b8bd-072b-42e3-8132-b7b8b9df0e1a UUID=5ef2b8bd-072b-42e3-8132-b7b8b9df0e1a     /crypto_keyfile.bin luks
#luks-4b590b97-0814-4af5-9995-e5e238b0da2d UUID=4b590b97-0814-4af5-9995-e5e238b0da2d     /crypto_keyfile.bin luks

/etc/default/grub

GRUB_DEFAULT=saved
GRUB_TIMEOUT=5
GRUB_TIMEOUT_STYLE=hidden
GRUB_DISTRIBUTOR="Manjaro"
GRUB_CMDLINE_LINUX_DEFAULT="quiet cryptdevice=UUID=5ef2b8bd-072b-42e3-8132-b7b8b9df0e1a:luks-5ef2b8bd-072b-42e3-8132-b7b8b9df0e1a apparmor=1 security=apparmor resume=/dev/mapper/luks-4b590b97-0814-4af5-9995-e5e238b0da2d udev.log_priority=3"
GRUB_CMDLINE_LINUX=""

# If you want to enable the save default function, uncomment the following
# line, and set GRUB_DEFAULT to saved.
GRUB_SAVEDEFAULT=true

# Preload both GPT and MBR modules so that they are not missed
GRUB_PRELOAD_MODULES="part_gpt part_msdos"

# Uncomment to enable booting from LUKS encrypted devices
#GRUB_ENABLE_CRYPTODISK=y

# Uncomment to use basic console
GRUB_TERMINAL_INPUT=console

# Uncomment to disable graphical terminal
#GRUB_TERMINAL_OUTPUT=console

# The resolution used on graphical terminal
# note that you can use only modes which your graphic card supports via VBE
# you can see them in real GRUB with the command 'videoinfo'
GRUB_GFXMODE=auto

# Uncomment to allow the kernel use the same resolution used by grub
GRUB_GFXPAYLOAD_LINUX=keep

# Uncomment if you want GRUB to pass to the Linux kernel the old parameter
# format "root=/dev/xxx" instead of "root=/dev/disk/by-uuid/xxx"
#GRUB_DISABLE_LINUX_UUID=true

# Uncomment to disable generation of recovery mode menu entries
GRUB_DISABLE_RECOVERY=true

# Uncomment this option to enable os-prober execution in the grub-mkconfig command
GRUB_DISABLE_OS_PROBER=false

# Uncomment and set to the desired menu colors.  Used by normal and wallpaper
# modes only.  Entries specified as foreground/background.
GRUB_COLOR_NORMAL="light-gray/black"
GRUB_COLOR_HIGHLIGHT="green/black"

# Uncomment one of them for the gfx desired, a image background or a gfxtheme
#GRUB_BACKGROUND="/usr/share/grub/background.png"
GRUB_THEME="/usr/share/grub/themes/manjaro/theme.txt"

# Uncomment to get a beep at GRUB start
#GRUB_INIT_TUNE="480 440 1"

# Uncomment to ensure that the root filesystem is mounted read-only so that
# systemd-fsck can run the check automatically. We use 'fsck' by default, which
# needs 'rw' as boot parameter, to avoid delay in boot-time. 'fsck' needs to be
# removed from 'mkinitcpio.conf' to make 'systemd-fsck' work.
# See also Arch-Wiki: https://wiki.archlinux.org/index.php/Fsck#Boot_time_checking
#GRUB_ROOT_FS_RO=true
GRUB_ENABLE_CRYPTODISK=y

Do you see this? It is commented and therefore will be ignored.

yes, i commented it myself(as Nachlese said), it doesnt make any sense anyways

Please think again. You say to linux, that it should load a crypt device:

But at the same time you disable the crypttab?

Makes no sense.

but it somehow works anyways, i think the info about crypttab may be in the other file
(check the top message, thats how i temporarily fix the problem)

If it works. What is the problem?

it works, but after the next big update it will break again

Still the same issue? It is just the efi partition? Did you check it? Do you use a tool which automatically merge pacnew files?

When I look at this log file, then you login:

мар 17 08:02:17 portableNigga sddm-helper[1005]: [PAM] Authenticating...
мар 17 08:02:17 portableNigga sddm-helper[1005]: [PAM] returning.
мар 17 08:02:17 portableNigga audit[1005]: CRED_ACQ pid=1005 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='op=PAM:setcred grantors=pam_permit acct="sddm" exe="/usr/lib/sddm/sddm-helper" hostname=? addr=? terminal=? res=success'
мар 17 08:02:17 portableNigga sddm-helper[1005]: pam_unix(sddm-greeter:session): session opened for user sddm(uid=963) by (uid=0)
мар 17 08:02:23 portableNigga sddm-helper[1053]: [PAM] Starting...
мар 17 08:02:23 portableNigga sddm-helper[1053]: [PAM] Authenticating...
мар 17 08:02:23 portableNigga dbus-daemon[718]: [system] Activating via systemd: service name='org.freedesktop.home1' unit='dbus-org.freedesktop.home1.service' requested by ':1.26' (uid=0 pid=1053 comm="/usr/lib/sddm/sddm-helper --socket /tmp/sddm-authb")
мар 17 08:02:23 portableNigga dbus-daemon[718]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.home1.service': Unit dbus-org.freedesktop.home1.service not found.
мар 17 08:02:23 portableNigga sddm-helper[1053]: pam_systemd_home(sddm:auth): systemd-homed is not available: Unit dbus-org.freedesktop.home1.service not found.
мар 17 08:02:23 portableNigga sddm-helper[1053]: [PAM] Preparing to converse...
мар 17 08:02:23 portableNigga sddm-helper[1053]: [PAM] Conversation with 1 messages
мар 17 08:02:23 portableNigga sddm-helper[1053]: pam_kwallet5(sddm:auth): pam_kwallet5: pam_sm_authenticate
мар 17 08:02:23 portableNigga audit[1053]: USER_AUTH pid=1053 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='op=PAM:authentication grantors=pam_shells,pam_faillock,pam_permit,pam_faillock acct="dedus" exe="/usr/lib/sddm/sddm-helper" hostname=? addr=? terminal=? res=success'
мар 17 08:02:23 portableNigga kernel: audit: type=1100 audit(1679029343.154:129): pid=1053 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='op=PAM:authentication grantors=pam_shells,pam_faillock,pam_permit,pam_faillock acct="dedus" exe="/usr/lib/sddm/sddm-helper" hostname=? addr=? terminal=? res=success'
мар 17 08:02:23 portableNigga sddm-helper[1053]: [PAM] returning.
мар 17 08:02:23 portableNigga audit[1053]: USER_ACCT pid=1053 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="dedus" exe="/usr/lib/sddm/sddm-helper" hostname=? addr=? terminal=? res=success'
мар 17 08:02:23 portableNigga sddm[772]: Authenticated successfully

And KDE Wayland starts also:

мар 17 08:02:25 portableNigga kwin_wayland[1090]: No backend specified, automatically choosing drm
мар 17 08:02:25 portableNigga kwin_wayland[1090]: OpenGL vendor string:                   Intel
мар 17 08:02:25 portableNigga kwin_wayland[1090]: OpenGL renderer string:                 Mesa Intel(R) UHD Graphics 620 (KBL GT2)
мар 17 08:02:25 portableNigga kwin_wayland[1090]: OpenGL version string:                  4.6 (Core Profile) Mesa 22.3.5
мар 17 08:02:25 portableNigga kwin_wayland[1090]: OpenGL shading language version string: 4.60
мар 17 08:02:25 portableNigga kwin_wayland[1090]: Driver:                                 Intel
мар 17 08:02:25 portableNigga kwin_wayland[1090]: GPU class:                              Kaby Lake
мар 17 08:02:25 portableNigga kwin_wayland[1090]: OpenGL version:                         4.6
мар 17 08:02:25 portableNigga kwin_wayland[1090]: GLSL version:                           4.60
мар 17 08:02:25 portableNigga kwin_wayland[1090]: Mesa version:                           22.3.5
мар 17 08:02:25 portableNigga kwin_wayland[1090]: Linux kernel version:                   6.0.19
мар 17 08:02:25 portableNigga kwin_wayland[1090]: Requires strict binding:                no
мар 17 08:02:25 portableNigga kwin_wayland[1090]: GLSL shaders:                           yes
мар 17 08:02:25 portableNigga kwin_wayland[1090]: Texture NPOT support:                   yes
мар 17 08:02:25 portableNigga kwin_wayland[1090]: Virtual Machine:                        no
мар 17 08:02:26 portableNigga kwin_wayland[1090]: kwin_xkbcommon: XKB: inet:323:58: unrecognized keysym "XF86EmojiPicker"
мар 17 08:02:26 portableNigga kwin_wayland[1090]: kwin_xkbcommon: XKB: inet:324:58: unrecognized keysym "XF86Dictate"
мар 17 08:02:26 portableNigga kwin_wayland_wrapper[1143]: (WW) Option "-listen" for file descriptors is deprecated
мар 17 08:02:26 portableNigga kwin_wayland_wrapper[1143]: Please use "-listenfd" instead.
мар 17 08:02:26 portableNigga kwin_wayland_wrapper[1143]: (WW) Option "-listen" for file descriptors is deprecated
мар 17 08:02:26 portableNigga kwin_wayland_wrapper[1143]: Please use "-listenfd" instead.

What is actually broken??? Please be more concrete.

[FAILED] Failed to mount /boot/efi. [DEPEND] Dependency failed for Local File Systems.
yeah, that is the issue. I dont know why it appears every time after the big updates
IDK, maybe i need to recreate the EFI partrition


I don’t know what pacnew files are, i dont think that i have the tools for that.

It appears when the UUID of the efi partition changed (happens on reformatting) or this partition is corrupt, so that it cannot be mounted.

If it is corrupt, why does it start working after steps that i described in the first message… strange
Anyways, maybe i need to delete it and then setup again?

Probably your RAM is faulty and silently write corrupt data, since it has no ECC? I would suggest to check that with memtest.

Is it a HDD? Maybe badblocks are involved, which are not known by the file system?

Also this:

мар 17 08:02:07 portableNigga kernel:     BOOT_IMAGE=/vmlinuz-6.0-x86_64

v6.0 is EOL. switch to v6.1 which ist the newest LTS or v5.15.

sdd. maybe the problem is with hybernation, which I use very often.
SMART says that my ssd is good

So i checked it with memtest86-efi. Passed. My ram is in good state.


You didnt answer.

Technically you don’t need to mount $esp (EFI system partition).

You can compare your system with my laptop is config

 # cat /etc/mkinitcpio.conf
# vim:set ft=sh
# MODULES
# The following modules are loaded before any boot hooks are
# run.  Advanced users may wish to specify all system modules
# in this array.  For instance:
#     MODULES=(usbhid xhci_hcd)
MODULES=""

# BINARIES
# This setting includes any additional binaries a given user may
# wish into the CPIO image.  This is run last, so it may be used to
# override the actual binaries included by a given hook
# BINARIES are dependency parsed, so you may safely ignore libraries
BINARIES=()

# FILES
# This setting is similar to BINARIES above, however, files are added
# as-is and are not parsed in any way.  This is useful for config files.
FILES="/crypto_keyfile.bin"

# HOOKS
# This is the most important setting in this file.  The HOOKS control the
# modules and scripts added to the image, and what happens at boot time.
# Order is important, and it is recommended that you do not change the
# order in which HOOKS are added.  Run 'mkinitcpio -H <hook name>' for
# help on a given hook.
# 'base' is _required_ unless you know precisely what you are doing.
# 'udev' is _required_ in order to automatically load modules
# 'filesystems' is _required_ unless you specify your fs modules in MODULES
# Examples:
##   This setup specifies all modules in the MODULES setting above.
##   No RAID, lvm2, or encrypted root is needed.
#    HOOKS=(base)
#
##   This setup will autodetect all modules for your system and should
##   work as a sane default
#    HOOKS=(base udev autodetect modconf block filesystems fsck)
#
##   This setup will generate a 'full' image which supports most systems.
##   No autodetection is done.
#    HOOKS=(base udev modconf block filesystems fsck)
#
##   This setup assembles a mdadm array with an encrypted root file system.
##   Note: See 'mkinitcpio -H mdadm_udev' for more information on RAID devices.
#    HOOKS=(base udev modconf keyboard keymap consolefont block mdadm_udev encrypt filesystems fsck)
#
##   This setup loads an lvm2 volume group.
#    HOOKS=(base udev modconf block lvm2 filesystems fsck)
#
##   NOTE: If you have /usr on a separate partition, you MUST include the
#    usr and fsck hooks.
HOOKS="base udev autodetect modconf block keyboard keymap consolefont plymouth encrypt openswap resume filesystems fsck"

# COMPRESSION
# Use this to compress the initramfs image. By default, gzip compression
# is used. Use 'cat' to create an uncompressed image.
#COMPRESSION="gzip"
#COMPRESSION="bzip2"
#COMPRESSION="lzma"
#COMPRESSION="xz"
#COMPRESSION="lzop"
#COMPRESSION="lz4"
#COMPRESSION="zstd"

# COMPRESSION_OPTIONS
# Additional options for the compressor
#COMPRESSION_OPTIONS=()

# MODULES_DECOMPRESS
# Decompress kernel modules during initramfs creation.
# Enable to speedup boot process, disable to save RAM
# during early userspace. Switch (yes/no).
#MODULES_DECOMPRESS="yes"

 # cat /etc/openswap.conf
## cryptsetup open $swap_device $crypt_swap_name
## get uuid using e.g. lsblk -f
swap_device=/dev/disk/by-uuid/ba7de57f-a261-4460-9da0-f8a295ccb5b2
crypt_swap_name=luks-ba7de57f-a261-4460-9da0-f8a295ccb5b2

## one can optionally provide a keyfile device and path on this device
## to the keyfile
keyfile_device=/dev/mapper/luks-13d81457-24a0-436a-b879-eb7bfc9ebea9
keyfile_filename=crypto_keyfile.bin

## additional arguments are given to mount for keyfile_device
## has to start with --options (if so desired)
#keyfile_device_mount_options="--options=subvol=__active/__"

## additional arguments are given to cryptsetup
## --allow-discards options is desired in case swap is on SSD partition
cryptsetup_options="--type luks"


 # cat /etc/crypttab
# /etc/crypttab: mappings for encrypted partitions.
#
# Each mapped device will be created in /dev/mapper, so your /etc/fstab
# should use the /dev/mapper/<name> paths for encrypted devices.
#
# See crypttab(5) for the supported syntax.
#
# NOTE: You need not list your root (/) partition here, but it must be set up
#       beforehand by the initramfs (/etc/mkinitcpio.conf). The same applies
#       to encrypted swap, which should be set up with mkinitcpio-openswap
#       for resume support.
#
# <name>               <device>                         <password> <options>
luks-13d81457-24a0-436a-b879-eb7bfc9ebea9 UUID=13d81457-24a0-436a-b879-eb7bfc9ebea9     /crypto_keyfile.bin luks
luks-ba7de57f-a261-4460-9da0-f8a295ccb5b2 UUID=ba7de57f-a261-4460-9da0-f8a295ccb5b2     /crypto_keyfile.bin luks
 # cat /etc/fstab
# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier for a device; this may
# be used with UUID= as a more robust way to name devices that works even if
# disks are added and removed. See fstab(5).
#
# <file system>             <mount point>  <type>  <options>  <dump>  <pass>
UUID=0C14-CA70                            /boot/efi      vfat    umask=0077 0 2
/dev/mapper/luks-13d81457-24a0-436a-b879-eb7bfc9ebea9 /              ext4    defaults,noatime 0 1
/dev/mapper/luks-ba7de57f-a261-4460-9da0-f8a295ccb5b2 swap           swap    defaults,noatime 0 0
tmpfs                                     /tmp           tmpfs   defaults,noatime,mode=1777 0 0
 # cat /etc/default/grub
GRUB_DEFAULT=saved
GRUB_TIMEOUT=5
GRUB_TIMEOUT_STYLE=hidden
GRUB_DISTRIBUTOR="Manjaro"
GRUB_CMDLINE_LINUX_DEFAULT="quiet cryptdevice=UUID=13d81457-24a0-436a-b879-eb7bfc9ebea9:luks-13d81457-24a0-436a-b879-eb7bfc9ebea9 root=/dev/mapper/luks-13d81457-24a0-436a-b879-eb7bfc9ebea9 splash resume=/dev/mapper/luks-ba7de57f-a261-4460-9da0-f8a295ccb5b2 udev.log_priority=3"
GRUB_CMDLINE_LINUX=""

# If you want to enable the save default function, uncomment the following
# line, and set GRUB_DEFAULT to saved.
GRUB_SAVEDEFAULT=true

# Uncomment to disable submenus in boot menu
#GRUB_DISABLE_SUBMENU=y

# Preload both GPT and MBR modules so that they are not missed
GRUB_PRELOAD_MODULES="part_gpt part_msdos"

# Uncomment to enable booting from LUKS encrypted devices
#GRUB_ENABLE_CRYPTODISK=y

# Uncomment to use basic console
GRUB_TERMINAL_INPUT=console

# Uncomment to disable graphical terminal
#GRUB_TERMINAL_OUTPUT=console

# The resolution used on graphical terminal
# note that you can use only modes which your graphic card supports via VBE
# you can see them in real GRUB with the command 'videoinfo'
GRUB_GFXMODE=auto

# Uncomment to allow the kernel use the same resolution used by grub
GRUB_GFXPAYLOAD_LINUX=keep

# Uncomment if you want GRUB to pass to the Linux kernel the old parameter
# format "root=/dev/xxx" instead of "root=/dev/disk/by-uuid/xxx"
#GRUB_DISABLE_LINUX_UUID=true

# Uncomment to disable generation of recovery mode menu entries
GRUB_DISABLE_RECOVERY=true

# Uncomment this option to enable os-prober execution in the grub-mkconfig command
GRUB_DISABLE_OS_PROBER=false

# Uncomment and set to the desired menu colors.  Used by normal and wallpaper
# modes only.  Entries specified as foreground/background.
GRUB_COLOR_NORMAL="light-gray/black"
GRUB_COLOR_HIGHLIGHT="green/black"

# Uncomment one of them for the gfx desired, a image background or a gfxtheme
#GRUB_BACKGROUND="/usr/share/grub/background.png"
GRUB_THEME="/usr/share/grub/themes/manjaro/theme.txt"

# Uncomment to get a beep at GRUB start
#GRUB_INIT_TUNE="480 440 1"

# Uncomment to ensure that the root filesystem is mounted read-only so that
# systemd-fsck can run the check automatically. We use 'fsck' by default, which
# needs 'rw' as boot parameter, to avoid delay in boot-time. 'fsck' needs to be
# removed from 'mkinitcpio.conf' to make 'systemd-fsck' work.
# See also Arch-Wiki: https://wiki.archlinux.org/index.php/Fsck#Boot_time_checking
#GRUB_ROOT_FS_RO=true
GRUB_ENABLE_CRYPTODISK=y

I FOUND USEFUL INFO!
The problem is not with kernel, but the problem occurs when the system changes the kernel.
So i ran:
sudo mhwd-kernel -i linux61 rmc
and got the problem
[FAILED] Failed to mount /boot/efi. [DEPEND] Dependency failed for Local File Systems. You are in emergency mode. After logging in, type “journalctl -xb” to view system logs. “systemctl reboot” to reboot. “systemctl default” or “exit” to boot into default mode. To continue enter root password(or press Control-D):
(Solved with steps, described in the top message)

When you recover your system in chroot, do you mount your /boot/efi partition?

Oh yes, that could be a possible problem, what @belyash said. If /boot/efi is not mounted, grub will write the efi file to root directory and not to the efi partition. If that happens, then /boot/efi is not empty and therefore refuse to mount.

I said:

and I said it because it says right there in the top part of the file that the root partition should not be included
(or rather: doesn’t need to be).

What that should have told you is:
try it and see - revert when it doesn’t improve things

another reason I said it:
I do run an encrypted system - with an empty /etc/crypttab :man_shrugging:

I am fairly convinced you will find you have caused this yourself - how? I have no idea.

But suffice to say - I have been running Manjaro since 2016 - and before that Arch, Cinnarch and Antergos.

I have never seen any issues that was not self inflicted and I am very certain that your issue is indeed that very same category - self-inflicted due to lack of knowledge - which was also my excuse.